Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe
-
Size
503KB
-
MD5
009ec5fcb2a918da326186b11387f464
-
SHA1
2c299b13a0200d573f3aa8401047424f96f61b8a
-
SHA256
b3521354b7e55289a66b054aec2a3ffe7f355ec7eace366424aadfcf0e426766
-
SHA512
2135944c5155677673fdf6bda917190f7c870506403005c5428f4bbfb673da98e261c98fd851a142ec39ef73496081dbe144cc228b85a246cbc6f076d3da6f17
-
SSDEEP
6144:R+/JFnV6YmLzUv3BF2idZecnl20lHRxp3gAPhKtdJEar56C41km2ixJS2:R+RFn0xUzF3Z4mxxfPMtM4Q1t2iL
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\brc_Server.exe 009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe File created C:\Windows\SysWOW64\brc_Server.exe 009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4420 009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe 4420 009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3164 4420 009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe 83 PID 4420 wrote to memory of 3164 4420 009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe 83 PID 4420 wrote to memory of 3164 4420 009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\009ec5fcb2a918da326186b11387f464_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a65355$$.bat2⤵PID:3164
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD563fec8ab087b40cad65d1cce1fd593da
SHA157b9965c6676c5d1b52124fd42574b5ec25e0d3c
SHA2564bb3226045f1e78a965af2f705ce46f9c166c8cda65a45e1d0d47125c1d42ac3
SHA512a563b054f50c380bd5d440b58a3ec11e08936059eb58a2bb42529a261391ce3e0cfae8323831fba4c53c614ce522f1548e89a25187a8144dd3aae6b020ce2c2e